Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Ryuta Nara"'
Autor:
Takeshi Yanai, Daiki Fukushima, Ryuta Narabayashi, Naoki Ogushi, Yuito Yamaguchi, Akihiro Yamashita, Masaki Nakano, Hirotoshi Fukunaga
Publikováno v:
AIP Advances, Vol 14, Iss 2, Pp 025020-025020-4 (2024)
We recently reported the electroplating of Fe-Pt thick films using plating baths with varying concentrations of NaCl, suggesting the potential for coercivity enhancement by Na ions. In the present study, our focus shifted to not Na ions but Cl ones,
Externí odkaz:
https://doaj.org/article/4e9683705e594855bd0d6a644478beeb
Publikováno v:
Thin Solid Films. 554:69-73
Vertically-aligned carbon nanotubes (VA-CNTs) have been attracting attention as the electrode material of polymer electrolyte fuel cell. Fe nanoparticles (FeNPs) were used as catalyst for VA-CNT growth. FeNP monolayer film was deposited on substrates
Publikováno v:
IPSJ Transactions on System LSI Design Methodology. 4:47-59
A scan-path test is one of the most important testing techniques, but it can be used as a side-channel attack against a cryptography circuit. Scan-based attacks are techniques to decipher a secret key using scanned data obtained from a cryptography c
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :2481-2489
Scan-based side-channel attacks retrieve a secret key in a cryptography circuit by analyzing scanned data. Since they must be considerable threats to a cryptosystem LSI, we have to protect cryptography circuits from them. RSA is one of the most impor
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :3229-3237
A scan chain is one of the most important testing techniques, but it can be used as side-channel attacks against a cryptography LSI. We focus on scan-based attacks, in which scan chains are targeted for side-channel attacks. The conventional scan-bas
Autor:
Nozomu Togawa, Kazuyuki Tanimura, Masao Yanagisawa, Shunitsu Kohara, Tatsuo Ohtsuki, Ryuta Nara, Youhua Shi
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :2304-2317
Modular multiplication is the most dominant arithmetic operation in elliptic curve cryptography (ECC), that is a type of public-key cryptography. Montgomery multiplier is commonly used to compute the modular multiplications and requires scalability b
Publikováno v:
Cryptography and Security in Computing
Individual authentication increases in importance as network technology advances. IC passport, SIM card and ID card used in entering and leaving management systems are dependent on a cryptography circuit for keeping their security. LSI chips used the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1ab78d88622f8d36fd3993486c98e71c
https://doi.org/10.5772/35441
https://doi.org/10.5772/35441
Publikováno v:
ISCAS
Scan test is a powerful and popular test technique because it can control and observe the internal states of the circuit under test. However, scan path would be used to discover the internals of crypto hardware, which presents a significant security
Publikováno v:
2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC).
Autor:
Kazuyuki Tanimura, Ryuta Nara, Shunitsu Kohara, Kazunori Shimizu, Youhua Shi, Nozomu Togawa, Masao Yanagisawa, Tatsuo Ohtsuki
Publikováno v:
2008 Asia and South Pacific Design Automation Conference.